Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering IIT Delhi. Lecture 26 Networked Embedded Systems III

Size: px
Start display at page:

Download "Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering IIT Delhi. Lecture 26 Networked Embedded Systems III"

Transcription

1 Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering IIT Delhi Lecture 26 Networked Embedded Systems III Today, we shall look at wireless networks which are intended for usage in much smaller areas then 8 to 2.11 that we had discussed in the last class. We call such networks wireless PAN wireless personal area network. (Refer Slide Time: 01:16) Now, what is the basic difference between wireless personal area network and wireless LAN? They are expected to have smaller coverage area lower data rates and ad hoc only topology in 8 to We had distinguished between ad hoc as well as infra structure based wireless LAN. Infact, I can have a infrastructure base wireless LAN where I have an access point connecting to the backbone. Here, the primary objective is to set up ad hoc networks. And the more important thing this context is the lower power consumption. And that is also reason why would like to limit coverage over restricted area.

2 (Refer Slide Time: 02:17) Bluetooth is currently and accepted IEEE standard for personal area network. It has got a short range, low power consumption, uses 2.4 Giga Hertz which is available which unlicensed band available is widely. But interface again with 8 to 2.11 b which also uses 2.4 Giga Hertz. It enables voice and data transmission at 1 Mbps rate and has got low cost. And it supports what we say open ended list of application in fact, lots of application concepts of develop around the Bluetooth specification. (Refer Slide Time: 03:05)

3 What the different application scenarios? We have the data and voice access points and through this access points you can have file transfer. You can have real time data as well as voice transmissions. So, example is 3 in 1 phone you can have a cordless phone to base station and intercom device as well as a cell phone. In fact, your hands free set for a cell phone can be connected via a Bluetooth link. The original objective with the Bluetooth was started was to replace cables variety of cable connections which are used for short range short distance connections whether they can be completely eliminated. And in fact, now, Bluetooth has grown beyond that very basic requirement. Also the ad hoc networking devices with Bluetooth radio can establish connection with another when in range. In fact, this gives a very interesting advantage that can be we are moving around. And you discover another Bluetooth enable device you can establish connection and an ad hoc network. The Bluetooth organization is based around to very basic concepts that of piconets and scatternets. (Refer Slide Time: 04:30) Piconets; in a way this cell which is the basic unit of Bluetooth networking. A piconet typically will have one master and 1 to 7 slave devices. If there are additional devices in the piconet they will not actively participating communication one the 7. The maximum of 7 slave devices can participate in communication with the master. So, each piconet has got 1 single master. Scatternet is the next higher level which consists of a set of piconets. Device is 1 piconet may exist as master or slave in another piconet and this allows many devices to share same area and makes efficient use of bandwidth.

4 (Refer Slide Time: 05:26) So, basically if you look in to it this is what would be the concept of a piconet. You have got this is master this is slave. Before a connection is created a device is in standby mode and it periodically listens for messages every 1 point to it seconds. And then devices are connected in an ad hoc fashion when there are other devices forming dynamically what is called a piconet. Each piconet has one master and up to 7 slaves. The nodes which are actually initiates the communication through negotiation typically takes over the role of the master. Other devices with in the piconet which are not slaving will be considered parked. This is the parked device with in the piconet. It is actually synchronized with respect to the piconet what is meant by synchronization will discuss later on. But it is not participating in data communication with the master. That is why we say that these node is in parked mode these are in stand by modes they are not actually in a way part of this piconet.

5 (Refer Slide Time: 06:46) Parked devices as well as slaves as synchronized to the master then you have got scatternet. What is done in scatternet? Multiple co located piconets are linked up through sharing of the common master or slave devices. Master in one can be slave in another piconet. A device can be slave in 1 piconet and master of another. No device can be master of 2 such piconets. (Refer Slide Time: 07:17) So, pictorially we look something like this. These are the two overlapping piconets. This is a slave which is common between the 2 piconets. These masters are distinct mode and

6 In fact, you can see that effectively I can establish communication between these slave nodes with these slave nodes. Because of this common slave connecting the 2 In fact, the common slave functions more like a bridge between the 2 piconets. (Refer Slide Time: 07:54) So, effectively what we get is interconnected piconets with in the scatternet form a backbone for mobile area network then you can actually complete network consisting of a set of piconets forming scatternets. So, you have got the nodes which may not even directly with each other, because keep in mind that ranges I said about 10 meters. So, there can be 2 nodes separated out they cannot communicate directly with each other. But through this provision of piconet and scatternet they can establish communication even though they do not have direct link. In fact, Bluetooth provides the protocol specification for point to point connection, as well as for a enabling devices not directly communicating to get link as well. In fact, these two aspects are taken care by Bluetooth and which goes in to creation of a mobile area network.

7 (Refer Slide Time: 9:02) What is the protocol structure? Obviously, at the lowest level you have got a radio frequency communication. On top of that this is specification of the physical layer; on top of that you have got the base band.how the basic data is to be structured packetized communicated. You have got a link manager you have L2CAP shall discuss this later on. And on top of that this is basically what you called middle ware protocols for various applications. And this application sits on top of this middle ware protocol. And in fact, interestingly you will find there is a specific audio protocol as part of Bluetooth which enables audio transmission. So, these sits directly on top of your base band layer. So, it is not at an application level that audio is deliberate. And you have got through this control what we called host controller interface. In fact, host controller interface provides a mechanism for interfacing of a Bluetooth host with the corresponding application.

8 (Refer Slide Time: 10:16) We shall not go in to details to these protocols, but let us try to understand these basic functionalities. In fact, we have seen from the diagram it is again a layer protocol architecture you have got core protocols, cable replacement and telephony control protocol and adopted protocols. In fact, we shall come to them later on. (Refer Slide Time: 10:51) Core protocols are what? The radio, baseband, link manager, link control and adaptation protocol and as well as service discovery protocols. What the radio protocol is supposed to do? It has to provide for the basic communication. Bluetooth is based up on spect

9 spectrum as well as and inspect spectrum as required it uses frequency hopping. The base band it provides a link control at bit and packet level coding encryption that is packet sing issues. The link manager protocol sets up the link and manages the link. And logical link control and adaptation protocol provided services to upper layer protocol; that means the applications which provides a data that has to be segmented in to the packets again when you receiving the packet said to put together. So, this is the L2CAP protocol. And in fact, you can realize that once I have at a top layer I can have even implantation of TCP IP protocol which can go through your L2CAP. So, TCP IP in this case a middle group protocol. (Refer Slide Time: 12:04) In fact, middle group protocol is a variety of firm. A simple if you remember that picture you have got RFCOMM which is the serial port emulation protocol. So, it enables legacy applications to operate seamlessly; that means, when we are having a serial port connectivity and I want to emulate the serial port connectivity over radio frequency I shall be using the RFCOMM protocol. In fact, you remember we talked about a telephony control protocol. So, say for example, if you consider that application where we said we have a telephone which can be moved around which is communicating with the base using your Bluetooth. So, I need a protocol to do this controlling we can have even a 3 telephone a telephone as well as the cell phone. And in such a case you need a telephony control signaling protocol.

10 In fact, TCS is a protocol at a middle layer which provides this application then the more interesting thing is the service discovery protocol. If you see your Bluetooth is basically an ad hoc protocol because if the devices come in contact the discover with each other. Now, this device can provide various kinds of services now, how do you understand the services being offered you need a protocol for service discovery. So, service discovery protocol discovers available services and it connects 2 or more devices such as fax machines printing etcetera.so, you can discover a printer it can discover a fax machine which is in the neighborhood. So, that is enable by the service discovery protocol. (Refer Slide Time: 14:01) What is the packet format? Packet format is typically like this you have got an access code packet header and payload. The access code identifies the piconet, because they can be over lapping piconets forming a scatternets. So, I need to know whether this message is for a particular piconet or not. So, that is gets identified by the access code of the packet.

11 (Refer Slide Time: 14:28) There are 3 classes of transmitters. In fact, you can see that 3 classes of transmitter is basically consume different amount of power and hence the ranges are also different. Typically it is the most commonly use is the ((refer time14:44)) range there are other 2 class 1 as well as 3 range of transmitters. So, the key aspect of the Bluetooth communication that is a physical layer part of it is frequency hopping what is frequency hopping mean and why is frequency hopping used? Obvious reason for frequency hopping is to provide resistance is interference. (Refer Slide Time: 15:14)

12 What is frequency hopping means that this transmitter s hope from 1 frequency band and narrow band that of frequencies to another narrow band frequencies over a time period in a particular fashion? Now, these make the system resistance to interference. As well as multi path effects what is the multi path effects? If it is a wireless protocol your data is actually getting reflected from the environmental objects and it will again come back. So, the data that is being received can come via multiple path and that can cause interference. And I need a mechanism by which I can minimize this interference. In fact, spread spectrum communication frequency hopping provides this capability. And that is the precise the reason why you will find the Bluetooth is using spread spectrum communication how it works? So, it provides the form of multiple access among co located devices in different piconets. In fact, there is a total 79 frequency are used for hopping and each with of bandwidth 1 Mega Hertz. So, you start with 2402 Mega Hertz, because I say it is 2.4 Giga Hertz is the basic range and you have got this k bands which a k is shifted 0 to 78, because we are talking about 79 such bands and these frequencies are used for hopping. All devices in a piconet in follow the same frequency hopping sequence. And they use 1600 hopes per second when they are actually communicating. So, therefore each frequencies occupied for a duration of 625 Micro second which is called a slot. So, the communication is therefore, this kind of slot centric and the frequency hopping pattern is same with respect to a piconet. (Refer Slide Time: 17:25)

13 So, what is the hopping sequence? Every Bluetooth device has got a unique device ID. It is a 48 bits Bluetooth address and a clock. So, master gives its device ID and clock to its slave fine. So, the master determines the hopping pattern. So, since the master manages the piconet then a piconet has got a unique master. So, each piconet has got it own hopping pattern. And the timing in the hopping pattern is determined by the clock. All slaves therefore, synchronize to the master in fact, what does thus that implies? That implies the slaves cannot transmit in a random fashion. It can only transmit in synchronization with the master. And if you remember you talked about pack notes what are pack notes? Pack notes are not really transmitting, but they are still synchronizing with respect to the master. So, what can happen is a current slave note can be put to packs state and a current pack note can become a slave. And that is the basic advantage of having pack notes synchronized with respect to the master. (Refer Slide Time: 18:50) So, how do really manage the piconet therefore, so, when 2 Bluetooth devices enter in to a communication range they attempt to communicate. If no piconet is available you need to negotiate to set up the piconet. So, when you negotiate one device will become a master and other becomes a slave. Typically, the device which initiates communications becomes a master In fact, the whole protocols specification is there this negotiation, because if you remember we talked about the Bluetooth specification for a point to point communication. So, this is between one slave and one master if I negotiate are there are a set of slaves and a master or a set of notes communicating among each other they would

14 negotiate to have one identified as a master and master communicate with slave by poling. So, basically the poling takes place according to a specific rule the most common poling can be round robin. So, because 1 after another we go and I have the master therefore, implements around robin poling scheme. And this is what is known as time division duplex when a master is transmitting slave is receiving and cannot transmit and when the slave is asked for slave will transmit master receives. (Refer Slide Time: 20:22) So, it is a time division duplex I hope you are understood why it is a duplex, because a typical time slot is provided for 1 way communication. But the link actually is a 2 way link fine. So, this is time is time division duplex and the master determines which slave will communicate. In fact, how does the poling takes place? Basically master sends the request to the slave and one slave receives the request in the next time slot slave will send its data.

15 (Refer Slide Time: 21:02) So, what we say that alternate transmission conceptually we are having alternate transmission. Master transmits may be on even number slots and slave transmits on odd numbered slots. A slave can transmit only if the master has just transmitted to this slave. A slave can transmit only if the master has just transmitted to the slave. This is basically the poling mechanism I said that communication takes place by poling. So, this is the poling mechanism. So, you can realize in this context you really cannot have a conflict, because there is only one master and you have the slaves and slaves are being provided with the slots. And if you look it in to the diagram what is being shown is that that this master is a sending it here slave is sending it here and there is frequency hopping which is talking place. The frequency hopping is talking place because each frequency occupies the fixed time period. So, this is an illustration of what is meant by frequency hopping and the frequency hopping pattern is same for the piconet. So, you are master as well as the slave. So, as we have master with fk the slave at fk plus 1 and again mater goes in to fk plus 2. So, fk is the frequency used in slot k according to the hopping sequence peculiar to that of the piconet. Now, the physical links can be of two types; one is called synchronous connection oriented link.

16 (Refer Slide Time: 22:51) Another is asynchronous connection less link. Typically the voice is transmitted through a synchronous connection oriented link. In this case it is a time sensitive traffic. So, that means, we have discussed even in the last class the issue is related to time sensitive traffic. Because you got to have data packets arrives at fix delay or even if there is a variation of delay you need to know a need to know the bound of that delay. So, in this case slots are reserved at regular intervals if slots are reserved at regular intervals then what is guaranteed? The arrival of time sensitive packets at fixed intervals and so, you can have therefore, transfer of voice In fact, I told you that all your transfer support has been inherent to this protocol. So, that is why you have this definition of what is called synchronous connection oriented link. In fact, master can support three such simultaneous link. And basic unit of reservation is to consecutive slots one in each direction. You can also understand the motivation for these you can actually have almost like a telephonic conversation over a Bluetooth link. The asynchronous connectionless link is for best effort traffic that is your data. And it can use variable packet size if the variable packet size means the slots that will be allocated for packet transfer to support a symmetric bandwidth requirement. And only a single ACL link can exist that it is a basic requirement. So the interesting feature is that this synchronous connection oriented link or asynchronous connectionless link how they are actually created? They are actually created if you look in to it the basic scheme is

17 what actually created by reservation of slots that is guaranteeing available of slots for delivery of time critical data. (Refer Slide Time: 25:12) Now, how this whole process of connection establishment does takes place, because that is the basic key part of your Bluetooth protocol. Because you have got this Bluetooth is primarily as the ad hoc network. So, devices not connected in a piconet I have already told you are in a standby mode then you have got a inquiry mode. A device sends an inquiry message to locate other devices within communication range and that device becomes master. If the device is sending the enquiry message to discover other device then that device becomes a master. Timing an idea of other devices is sending to the master those devices become slaves. This is also the page mode in a page mode master sends it timing and ID to the slaves using a page message. Now, the piconet assistance, because you know that master has to give its device ID to determine the frequency hopping pattern which characterizes a piconet. So, in a page mode the master sends it timing an ID to the slaves using a page message. And when it does that a piconet is established and communication session takes place. So, the basic things are initially nodes are in standby node there is an isolated node it will be typically in a standby node. Then it will initiate the inquiry discovers the other nodes assume the role of the master and then goes in to a page mode by which actually the piconet is set up.

18 (Refer Slide Time: 26:57) There also power saving modes, because power is an important aspect of these modes. So, these are Hold, Sniff and Park. Hold mode no data is transmitted and the device may connect to another piconet. So, currently it is on a hold it may decide to get connected to another piconet. Sniff is the device listens to the piconet at reduced intervals. And park the device gives up its active member address, because this active member address what there will be 7 active member that can be there in a piconet, but remains synchronized to the piconet. It does not participate in the traffic, but check on broadcast messages and that is the basic significance of the park you can realize that very easily a park mode can switched over slave mode.

19 (Refer Slide Time: 27:56) So, this is the state diagrams. So, of the state which in device is so, it is typically standby vso, the elegance are blue is unconnected. These are connecting stage then these are active stage and these are low power stage. So, from a standby mode you typically go in to an inquiry mode where you send inquiry message to discover other devices then there will be page mode for the master and page scan mode for the slaves. Scan mode means they are trying to process the message that has been provided by the master in a page mode and then they go in to a connected mode. And when they are connected they will be typically in a transmit mode when master and slaves will be normally in a transmit mode. If a slave knows out what it will go through? It will go to a hold state which is a low power state which is not really participating in the communication. It is go in to a sniff mode try to find out what is happening in the piconet it can also go to a part. But active master in the slave will be typically in a transmit mode. Next you have got the Bluetooth audio, because you have seen the Bluetooth audio sit directly on top of your base band. And we have already seen that how physical link provision is made for transmission of time critical data like audio data.

20 (Refer Slide Time: 29:42) In fact, there are voice encoding schemes which are made as a part of your Bluetooth typically you can have PCM or continuously variable slope delta modulation. This is nothing but variation of the, your standard delta modulations. These are the two basic schemes which had been defined as part of Bluetooth protocol. And choice of the scheme is made by link manager. And negotiates most appropriate scheme for application; that means, what is the encoding scheme to be adopted that is negotiated by the link manager and accordingly the encoding scheme is adopted for transmission of voice data. Bluetooth link also provides security why security is important? The moment you have got the wireless link you can have any receiver so, you can set up an ad hoc network I can always come in to a room put in to a Bluetooth device get connected to the network. And then listen to the messages which I am not suppose to listen this is the basic thread in a wireless network fine. So, security is always a very critical issue in any kind of wireless ad hoc networking.

21 (Refer Slide Time: 31:00) So, the elements of these security I am discussing in the context of Bluetooth, but this is valid for various other wireless protocols as well. Authentication and encryption; authentication is verify claimed identity if you have a definite identity. Then only you can be accommodated in the piconet otherwise you may not be accommodated then there is encryptions so, use a key to encrypt the data. So, when if you are listening to that data if you do not have the key you cannot decode the data. So, associated with this could be a important problem of key management and usage, because key distribution to takes place. Because this nodes to know the key for decoding a data. So, how safely the key has to be transfer that also becomes an issue. In fact, this are very basic issues with any kind of network security protocols. And they are also relevant in the context of Bluetooth more relevant in the context of Bluetooth, because it is an wireless channel any you can simply worked in with the Bluetooth enable device and since it is an ad hoc protocol the device may try to join the group and listen to the data which is not suppose to. Now, in with these kind of an ad hoc situation what is we are getting in to? We are getting in to a scenario where computers has gone outdoors.

22 (Refer Slide Time: 32:34) I In fact, they started with the basic idea embedded systems computers going in to a variety of appliances. Now, actually we have the ability to kind of an ad hoc network mobile network that is your node joining from 1 piconet to another piconet setting up your mantel in terms of your scatternet you actually have ability to be mobile and still taken it. So, your computer in strictly has gone in to a outside world. And what you are trying to talk about now is the distributed computing in an outside physical world. Distributed computing classical is in terms of computers connected computers where not located in a physical world we are not moving around in a physical world. But now, you have the ability the computers embedded computers can move around. So, can move around in the car and still it is a connected through an ad hoc networking. So, the whole idea here is cars can be collaborating for a safer and more fluid traffic. You do not bother about traffic signal you actually communicate have communication between the cars and you start communicating may be where you can come close together and you know which road to take on the basis of this communication. They can be distributed object tracking over a large geographical area. This is important for a variety of defense applications interestingly if you know the current controvers tracking the tiger in variety of tiger reserves. So, if you really have this kind of senses along with computers distributed in a forest area you have an automatic tracking this kind of wild animals in the habited. So, physically we are putting computers and you have the ability

23 to put computers in the external world and still stay connected. This list as to what is known as network sensing. (Refer Slide Time: 34:38) Because if you having computers all around what do you like to do? You like to do sensors sense information and communicated. So, you can have know sensor nodes spread over a geographical area which perform sensing, processing and capable of communication via this kind of wireless link. Sensors can be thermal sensor, magnetic sensor are variety of other sensors like microphone array ultrasonic sensors. The sensors can be static are even mobile can be interface to the actuators as well. So, since the interface the actuators the sensors you can control and take action influencing then environment. The next interesting thing is sensors now can be controlled. So, sensors in a way I just not passive sensors you can have formally active sensors. So, sensors can be activated aimed directed to move commanded to sense process and transmit. So, it is not just a camera which is looking at me it is a passive sensor. So, now, you can make the camera active in the sense that it can be commanded to move around remotely. So, they can be various such sensors which can be activated aim directed or commanded over your wireless link. So, nodes need to coordinate their sensing communication as well as computation tasks to accomplish high level goals. So, that is what has now, become reality with these enabling technology that we have so far discussed.

24 (Refer Slide Time: 36:22) So, what is advantage of this kind of a scenario? You have got rapid deployment, no cabling infrastructure required sensor placement is close to signal sources results in better SNR, signal to noise ratio, because you are not transmitting the signal. So, environmental noise did not corrupt the data. Now, you have the ability to cover wider areas, you can have variety of sampling can I have dense sampling, because you can put sensors that every spot you can have multiple aspect and multimode results what is multimodal sensing? In you can put multiple sensors put in to 1 embedded system and you can have multi modality sensor and onboard processing, because if you now put in we have got embedded system. So, if you put a processor so, what you we have talking about the movement we are talking about the wireless connectivity sensing be put in you are also putting a processor along with the sensor. So, effectively you can have process the data at the sensor itself and use low bandwidth communication link. And it will be robust again failure small number of sensor nodes, because you have already got an ad hoc protocol then there can be nodes discovered nodes can move out. But you may requires some special techniques to make the network self healing self organizing. And ability to scale gracefully, because if you look at you have got local net and local net connected over shared nodes. So, it can grow bigger without really protect in the constraint in the resources.

25 (Refer Slide Time: 38:08) So, effectively what we have now, got is embedded sensor nets embedded numerous distributed devices to monitor and interact with the physical world. And the enabling technology was embedded system networking as well as the sensing schemes. In fact, the sensing scheme the most key issue is signal processing. Embedded system we have seen that how to have designs small compact devices their basic characteristics networking is in terms of protocol we have seen how the variety of protocols enables this kind of communication. But other task level application level then interesting thing is that network devices can coordinate and perform higher level tasks. So, there can be a distributed coordination.

26 (Refer Slide Time: 38:56) So, today, the imaging applications are many. There is home automation and In fact, it is related to your environmental monitoring, habit monitoring, precision agriculture, security, surveillance, a big housing complex you can have a surveillance using sensor nets with them embedded sensors distributed all around. You can have agricultural monitoring micro climate sensing you can have habitat monitoring. I give an example of tiger being tracked using a sensor network you can have water quality monitored. You can have may be alone the Jamuna you have the water flowing through and you want to monitor pollution levels. And you want to get an automatic data accusation that you can do through this kind of sensor nets then structure in equipment monitoring, because if there is an effect of earthquake you can monitor automatically generate the response. So, you can have supply chain monitoring because your asset is moving around. And if you can track the assets; that means, any component or anything and you can find out whether you got enough store are not also you have got what is known as context aware computing. That means you can move in to a room the movement I move in to this room if I have some sensing device as well as transmitting device placed in my pocket lets a short pocket. So, the camera becomes on the recording becomes on automatically. So, a context have a system comes in. In fact, the whole area idea are a way sniff computing is built around this basic concept way sniff computing is what computing coming in to everyone.

27 (Refer Slide Time: 40:53) So, sensors can be a variety of sensors passive sensors, active sensors. Active sensors are those sensors which actually transmit some energy. And on the basis of transmitted energy it makes sensing of the external world. And the technology trend is make this sensors as small as possible. (Refer Slide Time: 41:19) So, the, what are the design issue is that comes up in this kind of a sensor net? The basic issue is self configuration because you cannot physically reconfigure a system, because environment may change without your knowledge. The whole system should have the

28 ability to reconfigure on its own a node can fail arbitrarily. But a node failure should not make the failure of the entire network eminent. They should be an ability to self healing or even notification being generated for this failure of nodes. Then leverage data processing inside the network. So, exploit computation near data to reduce communication and these leads to what is called known as collaborative signal processing. Collaborative signal processing means there can be multiple nodes collaborating with each other for a signal processing tasks. And you have long lived, unattended, untethered, low duty cycles systems, because if you put a such a system in a forest you cannot visit regularly. So, you got to design them as a robust and should be battery powered and battery expected to last for ears are together. So, energy becomes a central concern and what is very important is communication becomes a primary consumer of energy. Because you have seen you have got processors which have got very efficient energy characteristics and energy saving modes as well. But when you are communicating you have to transmit energy. So, you can understand that if I can do more processing at the node itself the need for communication would be less. So, there is this interesting a dual comes up it will communication and computation how much of computation is to be done how much of communication is to be done? So that you can optimize your energy usage. Next thing comes with the embedded control. (Refer Slide Time: 43:26)

29 So, if node is embedded in unattended way so, it can have a control systems. So, effectively get a control network which active in environment. So, you need critical application which extends beyond sensing to control an actuation. So, In fact, you can thick in terms of a variety of controller actions which can be initiated through this process. In fact, a simple control action could be that a kind of a hypothetical slightly features tic. You have your traffic signals sitting inside your car at a traffic signal what happens? Your cars stop so, instead of having a traffic signal externally you can have a traffic signal inside the car itself. So, when moving through this sensing it realizes that you should stop now and that traffic signal automatically applies the breaks, because breaking control can be an embedded system we have already seen that as part of a can network. So, your traffic signal can initiate the break once it sensors that there are other cars in the vicinity trying to task. So, you can have a control mechanism built it to it. The basic idea of in network processing the point I was telling. (Refer Slide Time: 44:44) The communication is expensive when its limited power and bandwidth. So, perform data processing in network close at data and you are distributed data you have naturally a distributed communication. Now, these basically lead to known as a collaborative signal processing task. And this collaborating signal processing task takes place.

30 (Refer Slide Time: 45:06) Over space overtime; this is interesting you should note this very carefully, because, now the signal processing problem in the context takes slightly differentially we talk about sampling of a signal over time domain. Now, when a phenomena is distributed over a geographical space and you are putting the nodes a different points what you are doing? You are doing a special sampling as well as temporal sampling. So, you have doing a space temporal sampling of the signal fine and each sample can now, be processed at different nodes, because you are physically sampling the space by putting nodes different locations. So, that the sample individual sample over time gets processed at different nodes. And if you have to get the pick picture out of such a network you need to have all this nodes collaborating together. So, that leads as to the concept of what is called collaborative signal processing node. So, sampling at of time series from each sensor is commensurate with the signal bandwidth. And sensor field is decomposed in to space time cells to enable distributed signal processing in a collaborative fashion. I can have a uniform sampling I can have a non uniform sampling of the space time.

31 (Refer Slide Time: 46:41) These are simple example that of the target tracking. I can track a target tracking using a variety of sensors. So, you see that there are various nodes and the sensors which are connected here. And let us look at a scenario. A target x moves from left to right and there are number of activities to handle fine. So, this is your target first target which is moving along this path. And this are all nodes and these nodes not always communicating with each other the blue arrows shows you that when depending on the need the communication is set up. So, first is the discovery of the target. The discovery of the target can be by this node A and there can be a query injected in to the network by the user from here. Query could be what is the target? There can be long term query which are there in a network itself being processed. Now, the query processing require what the routing of the query to the appropriate node, because the query has been posted by some node at some point and when there is a long run query it requires data accumulation for servicing the long run query then comes a collaborative process, because this node A has got some information and now this object is moving along. So, node B has to be allotted to gather information about this node. So, this is the basic collaborative processing just consider that you have got multiple cameras and there is a person moving around and you want to keep track keep image of that person using multiple cameras. But this cameras are not taking images blindly they are taking images when they have been activated. So, another target why I enter so, here you need to track both the targets. So, you have to have a time sharing. So, all the issues of time shear

32 concurrent systems becomes relevant with respect to the nodes that we are dealing with also there is a problem of data association the data that is being sensed I need to know that data belongs to which object. So, that is the data association problem. So, this is the very typical example of what we called collaborative signal processing problem and here I have basically sample space with various sensors. This sensors could be passive I had sensors could be in this case example is passive sensors as well as your only directional sound sensors ultra sound sensors. (Refer Slide Time: 49:24) So, sensor known therefore would have sensors CPU are radio for RF communication and a battery, the battery is of limited supply. So, energy efficient is crucial for hardware and software design.

33 (Refer Slide Time: 49:42) And let us take look at some simple examples of such nodes the Berkeley motes which are the most famous this kind of sensor motes there motes, because it says the device that incorporate communications processing sensing and batteries in to a small package. This Berkeley mote is built around Atmel micro controller with sensors and a communication unit. Communication unit could be an RF radio frequency could be a laser module or could be corner cube reflector. So, this are for optical communication then it can have temperature light humidity pressure magnetometer accelerometer sensors. So, if you see the basic frame work is this is your communication architecture and this path is you Atmel which is a micro controller. And to which you have got multiple channels of analog to digital converter to which your sensors that are actually linked. And this Atmel micro controller manages the hold show, but; obviously, you need a OS to run here and In fact, this Berkeley came up with the ways called TinyOS.

34 (Refer Slide Time: 50:57) In fact, TinyOS the interesting feature of the TinyOS is that it is a small OS. In fact, the whole idea is that OS is being provided as a set of components and your application which use this component and you compile OS as well as application together you have a high level language specification. So, when you compile it together your application along with OS gets compiled in to a source code which gets loaded in to the actual mote. In fact, it uses actually non preemptive scheduling, because there is a task queue tasks are put on the task queue. And then they are scheduled for execution when the task queue is empty what happens? The node goes in to energy saving node. This tasks typically run to completion when this task is preempted whenever there is a interrupt, because there is a so, many sensors whenever there is the interrupt this tasks are preempted. This interrupts are refer to as events. So, each interrupt correspond to what is called an event context called an even context. So, this is the basic event interface which is defined by a given context and when a even context means what and interrupts service to features of small duration and they would do some small work and again it would go back to the tasks. Task is not interrupted for servicing another tasks. In fact, the whole OS is model as a collection of concurrent FSA module with a single execution context. The most interesting feature of it at why this way the whole model has been built, because you want to minimize the complexity involved. The other interesting thing is that it is a compile time memory allocation there is no provision for dynamic memory allocation. The memory allocation is done

35 completely in the compile time cannot really have allot kind of a thing when you are developing an application in timing space, because that would change your memory requirements in run time and it require an overhead for heap management. So, that part is completely eliminated in TinyOS this another hardware example this is I want it to show. (Refer Slide Time: 53:33) Because you got a high level processor like arm which we are already studied and it is mote coming from Intel family. So, it is a back backbone I2C interconnects provides power and signaling. So, you got a sensor board main board and power board and use them to connect via I2C configuration I2C bus we have already discussed.

36 (Refer Slide Time: 53:57) They also have this antenna and this arm code with a flash and BT radio basically it implements provide. (Refer Slide Time: 54:08) So, Bluetooth and the OS is again the TinyOS and provides all the features of Bluetooth management.

37 (Refer Slide Time: 54:17) So, you can see how this motes can be used setting of the network. So, we have studied already Bluetooth. So, let us see I can have this nodes. So, effectively what you generate? You generate a piconet so, it is a fixed configuration you are tilling the space you are tilling the space and putting this nodes a piconet mate is set up. Then you have got multiple set up piconet and this piconet now gets connected. So, setting up your scatternet and the complete communication frame work so, this way I can have the connectivity to other nets. So, net can go on so, it is a tile. (Refer Time: 54:54)

38 So, it is a network creation the tile based approach which is the very basic fix configuration. You can also have a irregular network where each node performance proximity searches which is basically your enquiry. And then you do a master election and set up the piconet. So, it is a basic negotiation and ad hoc which can be built. (Refer Slide Time: 55:18) So, effectively I have this kind of node which is irregularly distributed. They start communication through enquiry. So, 1 gets selected as a master and then others become slave and you basically set up the piconet. And this can be done at over local over lapping intervals setting of the scatternet. So, basically you can see that using the Intel node, because it has got inherent support of Bluetooth in the software itself top of your tiny over. As well as the hardware support for Bluetooth communication you can use this kind of sensor node in an ad hoc fashion over Bluetooth network.

39 (Refer Slide Time: 56:01) So, we have learned about today wireless personal area network studied Bluetooth and got exposed to the concept of sensor networks. And we have seen how using Bluetooth we can set up a very simple sensor networks. But there would be more interesting and sophisticated algorithm sensor nets for a which are energy conscious and as well as application conscious and their issues related to design of such a network basic applications. So, that is what we shall look at in the next lecture any questions? So, see when a see the basically establish a connection here. So, at slot is allocated. So, when a slave goes in to a kind of a hold mode the master would know that it is not, no longer participating in the communication. So, any of the other node which is in the park node and park mode can now, switch in to a slave if the master then the piconet itself. So, the basic idea is the piconet is set up with the master in place. So, until and analysis all of them agrees to hand off the piconet will no long where exists the master really does not over.

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institute of Technology, Delhi

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institute of Technology, Delhi Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 13 Virtual memory and memory management unit In the last class, we had discussed

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking George Roussos! Bluetooth Overview Mobile and Ubiquitous Computing Bluetooth Networking" George Roussos! g.roussos@dcs.bbk.ac.uk! Bluetooth Overview" A cable replacement technology! Operates in the unlicensed ISM band at 2.4 GHz! Frequency

More information

101seminartopics.com. Bluetooth Based Smart Sensor Networks

101seminartopics.com. Bluetooth Based Smart Sensor Networks Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering Jean Parrend ENRNG3076 : Oral presentation BEng Computer and Communications Engineering 1 Origin 2 Purpose : Create a cable replacement standard for personal area network Handle simultaneously both data

More information

Intel Research mote. Ralph Kling Intel Corporation Research Santa Clara, CA

Intel Research mote. Ralph Kling Intel Corporation Research Santa Clara, CA Intel Research mote Ralph Kling Intel Corporation Research Santa Clara, CA Overview Intel mote project goals Project status and direction Intel mote hardware Intel mote software Summary and outlook Intel

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institution of Technology, Delhi

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institution of Technology, Delhi Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institution of Technology, Delhi Lecture - 34 Compilers for Embedded Systems Today, we shall look at the compilers, which

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

Wireless Personal Area Networks & Wide Area Networks

Wireless Personal Area Networks & Wide Area Networks Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks

More information

By FaaDoOEngineers.com

By FaaDoOEngineers.com ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless

More information

WIRELESS TECHNOLOGIES

WIRELESS TECHNOLOGIES WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee

More information

(Refer Slide Time 00:01:09)

(Refer Slide Time 00:01:09) Computer Organization Part I Prof. S. Raman Department of Computer Science & Engineering Indian Institute of Technology Lecture 3 Introduction to System: Hardware In the previous lecture I said that I

More information

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology SE 4C03 Winter 2005 Bluetooth Wireless Network Technology Researcher: Daren Tan Shen Hau Last Revised: April 4, 2005 Bluetooth As everyone will ask, what is Bluetooth? Bluetooth is a new technology that

More information

UNIT- 2 Physical Layer and Overview of PL Switching

UNIT- 2 Physical Layer and Overview of PL Switching UNIT- 2 Physical Layer and Overview of PL Switching 2.1 MULTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. Figure

More information

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity 1 2 The Vision Universal wireless connectivity Replace existing cables with radio Connect systems that have been separate Ubiquitous computing environment Intelligent devices performing distributed services

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

Sensor Application for Museum Guidance

Sensor Application for Museum Guidance Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power

More information

Special Course in Computer Science: Local Networks. Lecture

Special Course in Computer Science: Local Networks. Lecture Special Course in Computer Science: Local Networks Lecture 11 16.5.2012 Roadmap of the Course So far Basic telecom concepts General study of LANs Local Networks Ethernet Token bus Token ring ATM LAN Wi-Fi

More information

Wireless Personal Area Networks

Wireless Personal Area Networks CE 477 Wireless and obile Networks Wireless ersonal Area Networks Bluetooth CE 477 User cenarios Architecture rotocol tack IEEE 802.15.1 and IEEE 802.15.2 IEEE 802.15.4 (Low-Rate Wireless ersonal Area

More information

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016 3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING 1 UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING Syllabus: Physical layer and overview of PL Switching: Multiplexing: frequency division multiplexing, wave length division multiplexing, synchronous

More information

Bluetooth low energy technology Bluegiga Technologies

Bluetooth low energy technology Bluegiga Technologies Bluetooth low energy technology Bluegiga Technologies Topics Background What is Bluetooth low energy? Basic concepts Architecture Differentiation and comparison Markets and applications Background Background

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Wireless Sensor Networks BLUETOOTH LOW ENERGY. Flavia Martelli

Wireless Sensor Networks BLUETOOTH LOW ENERGY. Flavia Martelli Wireless Sensor Networks BLUETOOTH LOW ENERGY Flavia Martelli flavia.martelli@unibo.it Outline Introduction Applications Architecture Topology Controller specifications: Physical Layer Link Layer Host

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications Efficient Multicast Schemes for Mobile Multiparty Gaming Applications P6-6th semester 2006 Group 681 - ComNet Aalborg University 9th March 2006 Institut for elektroniske systemer Fr. Bajers Vej 7 Telefon

More information

Wireless networks. Wireless Network Taxonomy

Wireless networks. Wireless Network Taxonomy Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher

More information

Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review

Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review Access to the Web CMPT 165: Review Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University December 5, 2011 Access to the Web requires: a computer (of some kind) a connection

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System Item Type text; Proceedings Authors Uchil, Vilas; Kosbar, Kurt Publisher International Foundation for Telemetering Journal

More information

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2 CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Sensor Networks A wireless sensor network (WSN) is a wireless network consisting

More information

Wireless Communication Bluetooth, Timing

Wireless Communication Bluetooth, Timing Wireless Communication Bluetooth, Timing Amarjeet Singh February 22, 2012 Logistics Sample exam paper on the course website Group Project: Hardware nodes are with me. Software is still under development

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Networks for Multimedia

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Chapter 4: Communication Technology. Solutions

Chapter 4: Communication Technology. Solutions Chapter 4: Communication Technology Solutions Summative Assessment Multiple-Choice Questions (MCQs) 1. Two examples of network are telephone and. a. Radio b. Transmission c. Globe d. All of the above 2.

More information

Introduction to Bluetooth Wireless Technology

Introduction to Bluetooth Wireless Technology Introduction to Bluetooth Wireless Technology Jon Inouye Staff Software Engineer Mobile Platforms Group Intel Corporation Bluetooth Bluetooth is is a a trademark trademark owned owned by by Bluetooth Bluetooth

More information

Implementing A Bluetooth Stack on UEFI

Implementing A Bluetooth Stack on UEFI Implementing A Bluetooth Stack on UEFI Tony C.S. Lo Senior Manager American Megatrends Inc. presented by UEFI Plugfest October 2014 Agenda Introduction Bluetooth Architecture UEFI Bluetooth Stack Summary

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

Image acquisition and Communication

Image acquisition and Communication Image acquisition and Communication Developements around the ACME Fox Board E. Pamba Capo-ChiChi 1,2,G. Weisenhorn 1,J-M. Friedt 3,4 H. Guyennet 1,2 1 Department of Computer Science University of Franche-Comte

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institution of Technology, IIT Delhi

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institution of Technology, IIT Delhi Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institution of Technology, IIT Delhi Lecture - 20 Fundamentals of Embedded Operating Systems In today s class, we shall

More information

Lecture Objectives. Lecture and Bluetooth technology. Agenda. IEEE b. Characteristics. Center Frequencies

Lecture Objectives. Lecture and Bluetooth technology. Agenda. IEEE b. Characteristics. Center Frequencies Lecture Objectives Wireless Networks and obile ystems Lecture 2 802.11 and Bluetooth technology Discuss the operation of IEEE 802.11 and Bluetooth WLANs/WANs ummarize standardization efforts and recommendations

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Research on Modern Bluetooth Technology

Research on Modern Bluetooth Technology Research on Modern Bluetooth Technology D.Annal 1, T.Indira 2, K.Poojitha 3, R.Rajashree 4 Student, Dept. of CSE, Magna College of Engineering, Chennai, Tamil Nadu, India 1,2,3,4 ABSTRACT: The seemingly

More information

CHAPTER 3 BLUETOOTH AND IEEE

CHAPTER 3 BLUETOOTH AND IEEE CHAPTER 3 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the Bluetooth technology, developed by Ericsson Mobile Communications, a worldwide telecommunications company based in Sweden, is fast becoming the worldwide standard for short-range wireless communication.

More information

What is Smart Dust? Nodes in Smart Dust are called Motes.

What is Smart Dust? Nodes in Smart Dust are called Motes. Smart Dust Contents What is Smart Dust? How its work? History of smart dust. Smart Dust Mote Introduction Architecture Smart Dust Components Measurement, characteristic, & working of smart dust Communication

More information

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institute of Technology, Delhi. Lecture - 10 System on Chip (SOC)

Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institute of Technology, Delhi. Lecture - 10 System on Chip (SOC) Embedded Systems Dr. Santanu Chaudhury Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 10 System on Chip (SOC) In the last class, we had discussed digital signal processors.

More information

Lecture 1 Overview - Data Communications, Data Networks, and the Internet

Lecture 1 Overview - Data Communications, Data Networks, and the Internet DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking

More information

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology Bluetooth Tutorial Bluetooth strives to remove the never ending maze of wires which provide a communication link between different electronic devices, through a short range wireless solution. Consider

More information

Multi Hop Send Protocol Tool for TinyNodes Semesterthesis

Multi Hop Send Protocol Tool for TinyNodes Semesterthesis Multi Hop Send Protocol Tool for TinyNodes Semesterthesis Author: Supervisor: Tutor: Remo Niedermann Prof. Dr. Roger Wattenhofer Roland Flury Zurich, February 19, 2009 Acknowledgment At first I want to

More information

Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering

Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering Topics of discussion * Section 1. Wireless vs. Wired. Advantages and disadvantages

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht Personal Area Networks Seminar: Mobile Systems November 19th 2009 Krzysztof Dabkowski Supervisor: Fabio Hecht Agenda Motivation Application areas Historical and technical overview Security issues Discussion

More information

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed

More information

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS 3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 20 UAV Networks- Part- III So we come to finally,

More information

SDCI Student Project 6 Sensing Capabilites Go Wireless. Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri

SDCI Student Project 6 Sensing Capabilites Go Wireless. Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri SDCI 2012 Student Project 6 Sensing Capabilites Go Wireless Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri Overview Wireless Sensor Network Is a collection of nodes organized into a cooperative

More information

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea

Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea Junseok Kim Wireless Networking Lab (WINLAB) Konkuk University, South Korea http://usn.konkuk.ac.kr/~jskim 1 IEEE 802.x Standards 802.11 for Wireless Local Area Network 802.11 legacy clarified 802.11 legacy

More information

Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

Bluetooth. Quote of the Day. I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002 Bluetooth Stephen Carter March 19, 2002 Quote of the Day "I don't have to be careful, I've got a gun. -Homer Simpson 1 About Bluetooth Developed by a group called Bluetooth Special Interest Group (SIG),

More information

Delivering Voice over IEEE WLAN Networks

Delivering Voice over IEEE WLAN Networks Delivering Voice over IEEE 802.11 WLAN Networks Al Petrick, Jim Zyren, Juan Figueroa Harris Semiconductor Palm Bay Florida Abstract The IEEE 802.11 wireless LAN standard was developed primarily for packet

More information

(Refer Slide Time: 1:27)

(Refer Slide Time: 1:27) Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 1 Introduction to Data Structures and Algorithms Welcome to data

More information

Good day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc.

Good day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc. Computer Networks Prof. Sujoy Ghosh Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Token-Based MAC Good day. In the last lecture, we talked about various

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014. Advanced Mobile Computing and Networking - CS 560 Assessment CA 40% - Assignment 20% - 2 Tests 10% each Exam 60% Wireless Technologies, Infrared Data Association (),, and Institute of Electrical and Electronic

More information